DXC Security’s Breach Assessment service is designed to assist an organisation in identifying potential data breaches or compromise through the use of threat hunting techniques targeted at uncovering indicators of intrusion and exfiltration by a malicious actor.

By leveraging the skillsets and experience of DXC’s security professionals, a Breach Assessment will profile the suspected actor and begin tracking movement through log analysis, customised scanning, and manual investigation. It will identify any number of possible persistence methods used by modern day threats across Windows and Unix platforms. Malware, malicious scripts and executables can be extracted and examined to identify motive, and scope other known behaviours associated with the latest attack scenarios. This will give insight into other surfaces which may be at risk.

In the event of a detected or unseen threat, we can roll out lightweight Endpoint Protection Platform (EPP) agents to quickly identify anomalies and methods of lateral movement and data manipulation. DXC Security’s Breach Assessment assists organisations with quickly validating a potential breach to best adhere to the latest data breach regulations.

Why DXC?

When you partner with us, you can be confident that our focus on security will be business driven and end-to-end, based upon robust business and security processes and government-approved best practices.

Our overarching objective is to provide you with the security service and delivery framework that affords the most cost-effective balance between performance and protection.